NORMA eResearch @NCI Library

Two-layer security authentication system for a cloud application in order to decrease cyber attacks

Dasa Aswartha, Nithish Narayana (2022) Two-layer security authentication system for a cloud application in order to decrease cyber attacks. Masters thesis, Dublin, National College of Ireland.

[thumbnail of Master of Science]
Preview
PDF (Master of Science)
Download (787kB) | Preview
[thumbnail of Configuration manual]
Preview
PDF (Configuration manual)
Download (1MB) | Preview

Abstract

Thinking about Twenty-one-century life will involve data. It is modern gold, generated by people, systems, and organizations worldwide. Designs and patents, inventions, highly sensitive data, product and process concepts, and blueprints are all crucial to a company's success and must be protected. If product plans are leaked, a company’s research and development may be wasted. It is bad for business when competitors can easily steal your years of work and use them to make similar, if not better, products at lower prices. In view of the physical and economic hazards of data breaches, even smaller IT companies prioritize client data protection. As a result of these vulnerabilities, hackers are able to launch a variety of attacks that wipe out data or prevent the system from functioning at all. Thus, this is the most important consideration in digital life. Therefore, doubling up on security measures lessens the likelihood of a system being compromised. In this research, I designed a two-layer security system in which each layer employs a unique security technique. In this model, two layers of security are used. Fingerprint login is used as the primary form of authentication in the first security layer. Facial recognition is utilized as a secondary authentication factor at the next level. Because of the increased difficulty for the attacker or hacker to gain access to the cloud web application, a two-level authentication method has been proposed. The key purpose for utilizing so many layers of authentication is so that if an attacker manages to break through one layer, the following layer will still keep the system secure. After successfully developing the authentication for the web application, I can see that only authorized users can log in to the web application, making your data safer and more secure.

Item Type: Thesis (Masters)
Supervisors:
Name
Email
Mijumbi, Rashid
UNSPECIFIED
Subjects: Q Science > QA Mathematics > Electronic computers. Computer science
T Technology > T Technology (General) > Information Technology > Electronic computers. Computer science
T Technology > T Technology (General) > Information Technology > Cloud computing
Q Science > QA Mathematics > Computer software > Computer Security
T Technology > T Technology (General) > Information Technology > Computer software > Computer Security
Divisions: School of Computing > Master of Science in Cloud Computing
Depositing User: Tamara Malone
Date Deposited: 18 Apr 2023 14:52
Last Modified: 18 Apr 2023 14:52
URI: https://norma.ncirl.ie/id/eprint/6466

Actions (login required)

View Item View Item